An Overview of Spam Phenomenon; and the Key Findings of a Survey for Spam in Greece
|
|
- Hector Harrell
- 8 years ago
- Views:
Transcription
1 An Overview of Spam Phenomenon; and the Key Findings of a Survey for Spam in Greece Anastasios A. Pallas 1, Charalampos Z. Patrikakis 2 1 School of Computing, University of Paisley, PA1 2BE, Scotland, tpallas@sch.gr 2 TEI Peiraeus, Automation Deptm. Thivon 250, Aigaleo, Athens, Greece Abstract Spam has been involved in the every day life of users. They actually recognized it when they get annoyed with advertisements, bulk messages or in general all the unwanted e- mails in their mailbox. Recently, spam phenomenon has been also found to speak the Greek language; and some international flavors to shifting from annoying to threatening Internet users, which in effect constitute a major security and fraud issue over Internet. In the current paper, apart from introducing spam problem and providing an overview of its current countermeasures (anti-spamming), we present the most significant key finding from our survey for the spam phenomenon in Greece. Our areas of interest cover some of the major spam issues such as: awareness, impact, costs, legislation and anti-spamming. Introducing Spam The actual provenance of the word spam is derived from the words spiced ham (first entry in 1937) for describing a tinned meat made mainly from ham by Hormel Foods Corporation. In the electronic world, spam has not an official definition, thus some people consider advertisement via e- mails as spam, and others consider spam as just all unwanted s in their mailbox even though they are coming from their mammy. Actually, there are two rather official definitions for spam : Unsolicited Commercial (UCE) and Unsolicited Bulk (UBE). The term UCE is most frequently used in United States and widely used into its most important spam law formally called CAN-SPAM Act of 2003 [3]. UCE is explicitly used for commercial messages or in other words advertisements, such as messages with pornographic content, marketing of illegal software, etc. Although, the definition of UCE (along with CAN-SPAM Act of 2003) is very important, it excludes messages that can be spam and they are clearly not commercial in nature, for example political, frauds, malicious messages and many others, which are covered by UBE definition. General speaking, UBE is more broaden definition of spam covering messages sent to a large number of recipients who have not opt-in (i.e. give prior consent in written or electronic format) or have opt-out (i.e. asked somehow to unsubscribe). Besides, US law has a major drawback as it allows e-marketers to legitimately send messages as long as a recipient has not opts-out (i.e. opt-out approach to spam problem). In contrast within Europe Union, spam is prohibited by the European Directive for e-privacy 2002/58/EC, which clearly requires that commercial communication should not be allowed without recipients' prior consent, meaning that recipients have to prior opt-in in order to legitimately receive commercial messages (i.e. opt-in approach to spam problem) [4]. 1
2 Anti-Spamming Spam is meant to be one of the most critical problems upon Internet, nowadays. First of all, it wastes Internet users precious time. It is also contributes to the misuse of Internet bandwidth, computers processing power and storage capacity worldwide. Furthermore, there are also many hidden and rather difficult to be measured effects due to spam, such as the lost of legitimate s namely False Positives (FP) effect, the misleading of Internet consumers, exposure to unethical content for children, electronic frauds, etc. As a matter of fact, there have been also deployed a number of countermeasures, which are trying to moderate spam phenomenon (namely antispamming). For clarity reasons, we are going to present here a rather conceptual view of these approaches and not drill down to technical analysis. In general, there are three primarily not overlapped approaches: legal, social and technical [10]. Providing a more detail analysis of the efforts held in the technology-based approach, we can further distinguish countermeasures based on: i) where they reside and ii) how they react against spammer s techniques. In the first case, we can distinguish anti-spamming efforts that reside either to the side of the server or in other words to the Mail Transport Agent (MTA) of an service provider (i.e. namely mailer-based or server-based) or to those that run to the user s computer (i.e. namely user-based or client-based). In the second case, we can depict anti-spamming efforts into complementary approaches versus spammers methodologies [5]: Protect addresses: Spammers are trying to harvest addresses by using a number of methods, such as dictionary attacks to mailer and collect them from web sites. Preventing an address to be listed from spammers is mainly a set of directives and techniques that users can adopt. For instance, a rather effective technique has been proven to be the masquerading of addresses when they are going to be used in web sites, forums, etc by replacing for example the at symbol (@) or the dot (.) or by using more complicated methods [7][8]. Prevent spam from being sent: It is very common for spammers to use compromised/hijacked computers (also called as zombie) all around the world in order to send unsolicited messages. Preventing spam from being sent involves not only the regular checks of computers security holes, but also blocking of SMTP and proxy relays. Block spam to be delivered: There are a number of different techniques here that are trying to identify spam messages before actually reach our mailbox. Some of them are checking sender authentication such as Sender Policy Framework (SPF) and blocking exploited sources of known spammer based on IP or DNS (i.e. DNSBLs 1 ) [16]. Usually these methods have been widely adopted by Internet Services providers in order to refuse delivery of spam messages. Identify and separate spam after delivery: Spammers are continually inventing new tricks in order to spoof anti-spamming filters. Identifying spam based on content analysis of the messages has been proven to be very difficult indeed. However, two methods have been proven here to be more effective: i) the analysis that is based on the targeted link (i.e. URI 2 analysis and SURBLs 3 ) and ii) Bayesian filters that are relying on adaptive filtering algorithms. As we already mention, the above technology-based techniques are basically complementary and not primarily overlapped. Thus, these techniques are common not to be used alone, but rather to be invoked into the so called heuristics or rule-based scoring systems. As a matter of fact, heuristics is not so much a unique method rather a framework for combining various tests (such those we mentioned above) and assigning relative scores to their results; the summary of the resulting scores 1 Domain Name System Blacklists or Blocklists 2 Uniform Resource Identifier 3 Spam URI Real-time Block-lists 2
3 is finally compared to a preset threshold. If a message score exceeds the threshold then it is assumed that it is spam or if it is below the threshold then it is ham (i.e. not spam) [12][13]. A Survey for Spam Phenomenon in Greece The scope of our survey was to investigate the spam phenomenon in Greece, through the acquisition of feedback from the major players, such as Greek Internet service providers (ISPs), independent service providers, and academic institutions. The data collection techniques invoked the study of spam-related documentation, questionnaires and interviews with experts. Our survey data was collected via interviews with experts and the procedure was guided by a specialised questionnaire consisted with quantitative and qualitative data. In our case, expert consisted by IT directors, administrators, system administrators and other IT technical staff that have strong relationship in the administration of their systems at strategic or technical level. The key issues investigated in our survey were: i) spam awareness, ii) impact of spam, iii) costs related to spam, iv) spam legislation, v) anti-spamming, vi) Greek spamming and vii) the future of spam. Our questionnaire comprised of a total of sixty seven (67) questions that most of them were in closed-end format; and in the majority of the questions answerers were provided with the ability not to answer the question either due to unwillingness (i.e. I prefer not to answer ) or due to insufficiency of knowledge (i.e. I don t know ). Apart from the questionnaire, the discussion with the experts was indeed beneficial, covering trends on spamming and anti-spamming, as well as, feedback on how they currently handling the phenomenon and what are their opinion about spam. The survey took place in 2005 with the participation of experts from the major Greek ISPs, e- mail providers and educational institutions. It is important to say that our sample covered a significant portion of the population of the major players that exist nowadays in Greece; and with regards to the people participated, the majority of those were experts employed in educational institution and the rest were working for ISPs and independent hosting providers. Furthermore, the majority of experts interviewed were system administrators and administrators, some of them general directors and a small portion were technical personnel.[9] Key Findings and Recommendations The key findings derived from our survey can be summarized to the followings: As it was expected defining spam seems to be a little confusing; however, most dominant opinions are identifying spam as UCE and UBE. Spam is rather a very important issue to our sample of organizations. The percentage of s identified as spam in Greece seems to be quite similar to the global spam statistics [11][12]. This indicates that spam has analogous impact to Greece as worldwide; and as a matter of fact, Greeks should increase their concern about the spam phenomenon irrespectively to the difference of language. Almost all providers have been established some low-cost (mainly software-based) countermeasures to moderate spam effects, as well as, to eliminate users complains. Regarding spam legislation, it is essential that experts already recognize that spam phenomenon is not explicitly dedicated to the communication and they would like legislation to be rather sufficient; and why not stand alone. Our sample believe that the regulation of spam passes through legislation, penalties and an appropriate national agency, which with the assistance of ISPs should be able to bring actions against spammers. Major players seem also willing to provide necessary information, but they are skeptical to provide details regarding their customers. 3
4 The majority of providers use for anti-spamming the well-known DNSBLs and a significant portion has also enable heuristic techniques and custom filters to the serverend. Providers seem also to be quite satisfied with their tools, but they are concerned about filtering accuracy and the involvement of users to the process. A major problem that came to the surface is the manipulation of the identified spam, where our survey identified some misuse. Unfortunately not all messages identified as spam are really spam. By either moving these messages to separate folder or deleting them, we increase the change of missing important legitimate messages. Finally, almost half of experts believe that spam in Greek language are insignificant compared to the English-based and that it is quite rare; and for a portion of them also believe that it is difficult to be identified by anti-spam tools. Furthermore, half of the experts seem also worrying about the impact of spam to the spread of Internet in Greece. Finally, experts forecasts are unfortunately discouraged for both spam phenomenons worldwide, as well as, for spam in Greek language. We believe that spam phenomenon tends to be social rather than technological, and needs a unified approach and cross-border cooperation in order to be effectively reduced. Spammers are meant to take advantage of any broadband medium available and not only communication. Spam in mobile communication is actually expected to be highly increased into the following years and become a critical issue comparative with spam in communication [2]. Much the same, spam is expected to be spread into Internet Telephony and Voice over IP (VoIP) under the name SPIT 4, as well as, into Internet Instance Messaging (IM) (eg. ICQ and MSN Messager) under the name SPIM 5. [10] It is also amazing that recently spam has been also found to speak Greek. Indeed, during our experiments with the use of spam traps 6 that held from 21st March 2005 to 10th October 2005 (204 days), 10 spam messages found to be in Greek out of the total 125 spam messages, representing the 8%. Even though, Greek spamming is still rather small in contrast to the English-based, we should take proper actions to eliminate it before is too late. On the same hand, some international flavors of spam are shifting from annoying to threatening Internet users society. As a matter of fact, the amount of electronic frauds traveling though spam under the name Phishing 7 and Pharming has dramatically increased the last years [1][6]. With the term phishing, we actually mean the exposure of Internet users sensitive information such as credit card numbers, bank accounts and access passwords; and with the term pharming, we mean the decoy web sites where intruders redirect users in order to harvest their data [14][15]. Under these circumstances, we believe that national bodies should take immediate actions against spam phenomenon, set up or appoint an appropriate agency/operator that will lead into activities against spammers and their sponsors. On the same hand, with spam tending to constitute a major Internet security and e-fraud problem Internet Service Providers (ISPs) should also take actions by providing assistance to enforcement agencies along with undertaking of users education. We believe that ISPs should offer continuous and free guidance to users against spam, which should include what they should be aware, how to avoid spam, and how they should react. 4 Spam over Internet Telephony 5 Spam in Instant Messaging 6 A decoy address that is explicitly used for collecting spam is called spam honey pot or spam trap. 7 Phishing is derived from the words: Password Harvesting and fishing. 4
5 Acknowledgements Authors would like to mention that the survey was part of the MSc thesis of Mr. Anastasios Pallas under the title The spam phenomenon: techniques, countermeasures; and its distinctiveness in Greece ; and they would like to thank the people participated into this survey for spam, for their assistance and useful feedbacks. References [1] Anti-Phishing Working Group (APWG). Phishing Activity Trends Report. APWG, September 2005 ( [2] Brodt, Torsten and Janos Hee. Insights into Mobile Spam: World s First Collaborative Empirical Study. University of St. Gallen, Switzerland, [3] CAN-SPAM Act of 2003, Public Law , 108 th Cong., 1 st sess., 16 December 2003 ( [4] Directive 2002/58/EC. Concerning the Processing of Personal Data and the Protection of Privacy in the Electronic Communications Sector O.J. (L 201) 37 ( [5] Koh, Eung Lyeol. Anti-Spam Toolkit: Existing and Emerging Technical Measures against Spam. Slide presentation. Spam Response Team, Korea Information Security Agency, 8 September [6] Matthew P., (2005). Pharmaing Is Latest Internet Security Threat. Inc.com, 20 June 2005 ( [7] Morris, John, (2003). Best Practices for End Users. Presentation to Internet Engineering Task Force 56, San Francisco, California, USA, March 2003 ( [8] Pallas A., (2005). Hide your from spammers ( [9] Pallas A. and Patrikakis C., (2006). The Spam Phenomenon in Greece, Countermeasures and Future Trends. Proceedings of the 2nd Conference on Electronic Democracy: Challenges of the Digital Era. Athens, Greece, March 16-17, [10] Patrikakis C. and Pallas A., (2006). Are we ready to face next-generation spam?. Cutter IT Journal. January 2006 Vol. 19, No 1. ISSN: [11] Symantec Corporation (2005). Symantec Spam Statistics - Monthly report analyzing Symantec's probe network data to identify trends. May 2005 ( [12] The Apache SpamAssassin Project (2004). Spam - What is spam? SpamAssassin Wiki (wiki.apache.org/spamassassin/spam). [13] The Spamhaus Project, (2006). "Effective Spam Filtering" ( [14] Wikipedia Web site ( [15] Wikipedia Web site ( [16] Wong M. and Schlitt W., (2005). Sender Policy Framework (SPF) for Authorizing Use of Domains in . Network Working Group Internet Draft, IETF ( 5
escan Anti-Spam White Paper
escan Anti-Spam White Paper Document Version (esnas 14.0.0.1) Creation Date: 19 th Feb, 2013 Preface The purpose of this document is to discuss issues and problems associated with spam email, describe
More informationSoftware Engineering 4C03 SPAM
Software Engineering 4C03 SPAM Introduction As the commercialization of the Internet continues, unsolicited bulk email has reached epidemic proportions as more and more marketers turn to bulk email as
More informationeprism Email Security Appliance 6.0 Intercept Anti-Spam Quick Start Guide
eprism Email Security Appliance 6.0 Intercept Anti-Spam Quick Start Guide This guide is designed to help the administrator configure the eprism Intercept Anti-Spam engine to provide a strong spam protection
More informationAnti-Spam Measures Survey 2009. Pascal Manzano ENISA
Anti-Spam Measures Survey 2009 Pascal Manzano ENISA Do you remember what happen on June 25 th? Methodology Online questionnaire open from May until July 2009 Questionnaire used providers best practices
More informationDraft WGIG Issues Paper on Spam
Draft WGIG Issues Paper on Spam 1. Issue Spam directly engages a very wide range of stakeholders that includes individual consumers, all organizations of whatever size in the private and public sectors
More informationHow to Stop Spam Emails and Bounces
Managing Your Email Reputation For most companies and organizations, email is the most important means of business communication. The value of email today, however, has been compromised by the rampant
More informationwhite paper Glossary of Spam Terms The jargon of the spam industry
white paper Glossary of Spam Terms The jargon of the spam industry Table of Contents A Acceptable Use Policy (AUP)..................................................... 5 Alias...........................................................................
More informationProtecting your business from spam
Protecting your business from spam What is spam? Spam is the common term for electronic junk mail unwanted messages sent to a person s email account or mobile phone. Spam messages vary: some simply promote
More informationHow To Stop Spam From Being A Problem
Solutions to Spam simple analysis of solutions to spam Thesis Submitted to Prof. Dr. Eduard Heindl on E-business technology in partial fulfilment for the degree of Master of Science in Business Consulting
More informationPhoenix Information Technology Services. Julio Cardenas
Phoenix Information Technology Services Julio Cardenas Email spam, also known as junk email or unsolicited bulk email (UBE), is a subset of electronic spam involving nearly identical messages sent to numerous
More informationSpam e-mail: How Malaysian e-mail Users Deal with It?
Spam e-mail: How Malaysian e-mail Users Deal with It? Yanti Rosmunie Bujang and Husnayati Hussin Abstract This paper attempts to discuss the spam issue from the Malaysian e-mail users perspective. The
More informationFighting spam in Australia. A consumer guide
Fighting spam in Australia A consumer guide Fighting spam Use filtering software Install anti-virus software Use a personal firewall Download security patches Choose long and random passwords Protect your
More informationMDaemon configuration recommendations for dealing with spam related issues
Web: Introduction MDaemon configuration recommendations for dealing with spam related issues Without a doubt, our most common support queries these days fall into one of the following groups:- 1. Why did
More informationSCORECARD EMAIL MARKETING. Find Out How Much You Are Really Getting Out of Your Email Marketing
EMAIL MARKETING SCORECARD Find Out How Much You Are Really Getting Out of Your Email Marketing This guide is designed to help you self-assess your email sending activities. There are two ways to render
More informationEnterprise Email Marketing: The 8 Essential Success Factors
Enterprise Email Marketing: The 8 Essential Success Factors How to Create High-Impact Email Marketing Campaigns When Managing Over 1 Million Sends per Month By John H. Sellers Certified Email Marketing
More informationIs Spam Bad For Your Mailbox?
Whitepaper Spam and Ham Spam and Ham A Simple Guide Fauzi Yunos 12 Page2 Executive Summary People tend to be much less bothered by spam slipping through filters into their mail box (false negatives), than
More informationSPAM FILTERING IMPLEMENTATION USING OPEN SOURCE SOFTWARE
SPAM FILTERING IMPLEMENTATION USING OPEN SOURCE SOFTWARE AHMAD BAKHTIAR BIN IBRAHIM A PROJECT PAPER SUBMITTED IN PARTIAL FULFILMENT OF REQUIREMENT BARCHELOR OF SCIENCE (Hons) IN DATA COMMUNICATION AND
More informationEmails and anti-spam Page 1
Emails and anti-spam Page 1 As the spammers become increasing aggressive more and more legit emails get banned as spam. When you send emails from your webcrm system, we use the webcrm servers to send emails
More informationAnalysis of Spam Filter Methods on SMTP Servers Category: Trends in Anti-Spam Development
Analysis of Spam Filter Methods on SMTP Servers Category: Trends in Anti-Spam Development Author André Tschentscher Address Fachhochschule Erfurt - University of Applied Sciences Applied Computer Science
More informationThe Network Box Anti-Spam Solution
NETWORK BOX TECHNICAL WHITE PAPER The Network Box Anti-Spam Solution Background More than 2,000 years ago, Sun Tzu wrote if you know yourself but not the enemy, for every victory gained you will also suffer
More informationIntercept Anti-Spam Quick Start Guide
Intercept Anti-Spam Quick Start Guide Software Version: 6.5.2 Date: 5/24/07 PREFACE...3 PRODUCT DOCUMENTATION...3 CONVENTIONS...3 CONTACTING TECHNICAL SUPPORT...4 COPYRIGHT INFORMATION...4 OVERVIEW...5
More informationVoice Printing And Reachability Code (VPARC) Mechanism for prevention of Spam over IP Telephony (SPIT)
Voice Printing And Reachability Code (VPARC) Mechanism for prevention of Spam over IP Telephony (SPIT) Vijay Radhakrishnan & Ranjith Mukundan Wipro Technologies, Bangalore, India Email:{radhakrishnan.vijay,
More informationHow To Protect Your Email From Spam On A Barracuda Spam And Virus Firewall
Comprehensive Email Filtering: Barracuda Spam & Virus Firewall Safeguards Legitimate Email Email has undoubtedly become a valued communications tool among organizations worldwide. With frequent virus attacks
More informationSpam DNA Filtering System
The Excedent Spam DNA Filtering System provides webmail.us customers with premium and effective junk email protection. Threats to email services are rising rapidly. A Growing Problem As of November 2002,
More informatione-shot Unique Deliverability
e-shot Unique Deliverability Email Deliverability What is Email Deliverability? Email deliverability s aim is to maximise the number of email messages that reach the intended recipients inboxes. It is
More informationComprehensive Email Filtering. Whitepaper
Comprehensive Email Filtering Whitepaper Email has undoubtedly become a valued communications tool among organizations worldwide. With frequent virus attacks and the alarming influx of spam, email loses
More informationHow To Block Ndr Spam
How to block NDR spam Spam generates an enormous amount of traffic that is both time-consuming to handle and resource intensive. Apart from that, a large number of organizations have been victims of NDR
More informationHow To Stop Spam
Combating Spam: Policy, Technical and Industry Approaches INTRODUCTION Spam continues to be a significant problem for Internet users and operators, even as email filtering and blocking efforts by network
More informationCollateral Damage. Consequences of Spam and Virus Filtering for the E-Mail System. Peter Eisentraut 22C3. credativ GmbH.
Consequences of Spam and Virus Filtering for the E-Mail System 22C3 Introduction 12 years of spam... 24 years of SMTP... Things have changed: SMTP is no longer enough. Spam filters, virus filters are part
More informationBroadband Acceptable Use Policy
Broadband Acceptable Use Policy Contents General... 3 Your Responsibilities... 3 Use of Email with particular regards to SPAM... 4 Bulk Email... 5 Denial of Service... 5 Administration of Policy... 6 2
More informationHow To Stop Spam From Being A Launching Point For Spam On Your Email Account
CMSGu2012-07 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Spam Control National Computer Board Mauritius Version 1.0
More informationEmail AntiSpam. Administrator Guide and Spam Manager Deployment Guide
Email AntiSpam Administrator Guide and Spam Manager Deployment Guide AntiSpam Administration and Spam Manager Deployment Guide Documentation version: 1.0 Legal Notice Legal Notice Copyright 2013 Symantec
More informationNETWORK RESOURCE THEFT PREVENTION Destroying the Economics of Spam
1 NETWORK RESOURCE THEFT PREVENTION Destroying the Economics of Spam A SpamSquelcher White Paper by eprivacy Group December, 2003 How true network perimeter anti-spam protection prevents spammers from
More informationPrivacy, Data Collection and Information Management Practice Team November 13, 2003
Overview of Current Anti-Spam Regulations Privacy, Data Collection and Information Management Practice Team The proliferation of unsolicited commercial e-mail, more commonly known as spam, has prompted
More informationEmail Marketing Workshop
Email Marketing Workshop Part V Deliverability, Compliance & Trust Agenda Getting To The Inbox Protecting Your Brand Email Laws & Regulations 1 Laurence Rothman Nationwide Senior Consultant, Brand Reputation
More informationStop Spam Now! By John Buckman. John Buckman is President of Lyris Technologies, Inc. and programming architect behind Lyris list server.
Stop Spam Now! By John Buckman John Buckman is President of Lyris Technologies, Inc. and programming architect behind Lyris list server. Copyright 1999 Lyris Technologies, Inc. Stop Spam Now! 1 Introduction
More informationKingdom of Saudi Arabia Communication and Information Technology Commission. Public Consultation Document On the Anti-SPAM Policy Framework
Kingdom of Saudi Arabia Communication and Information Technology Commission Public Consultation Document On the Anti-SPAM Policy Framework Rajab 1428 H (July 2007) 1. Introduction SPAM 1 represents a major
More informationEmail Marketing Glossary of Terms
Email Marketing Glossary of Terms A/B Testing: A method of testing in which a small, random sample of an email list is split in two. One email is sent to the list A and another modified email is sent to
More informationCloud Services. Email Anti-Spam. Admin Guide
Cloud Services Email Anti-Spam Admin Guide 10/23/2014 CONTENTS Introduction to Anti- Spam... 4 About Anti- Spam... 4 Locating the Anti- Spam Pages in the Portal... 5 Anti- Spam Best Practice Settings...
More informationCOMBATING SPAM. Best Practices OVERVIEW. White Paper. March 2007
COMBATING SPAM Best Practices March 2007 OVERVIEW Spam, Spam, More Spam and Now Spyware, Fraud and Forgery Spam used to be just annoying, but today its impact on an organization can be costly in many different
More informationOverview An Evolution. Improving Trust, Confidence & Safety working together to fight the e-mail beast. Microsoft's online safety strategy
Overview An Evolution Improving Trust, Confidence & Safety working together to fight the e-mail beast Holistic strategy Prescriptive guidance and user education, collaboration & technology Evolution of
More informationEmail Security - A Holistic Approach to SMBs
Implementing the latest anti-virus software and security protection systems can prevent many internal and external threats. But these security solutions have to be updated regularly to keep up with new
More informationMessaging Firewall. W h i t e p a p e r. w w w. c m s c o n n e c t. c o m
Messaging Firewall W h i t e p a p e r w w w. c m s c o n n e c t. c o m Introduction Well, there's egg and bacon; egg sausage and bacon; egg and spam; egg bacon and spam; egg bacon sausage and spam;
More informationTop 40 Email Marketing Terms You Should Know
1601 Trapelo Road Phone 781-472-8100 Suite 246 Fax 781-472-8101 Waltham, MA 02451 www.constantcontact.com Top 40 Email Marketing Terms You Should Know If you have ever felt out of your depth in a discussion
More information5 tips to improve your email database. An Experian Data Quality white paper
5 tips to improve your email database An Experian Data Quality white paper While many marketers spend significant time and effort optimizing content and debating the timing of each campaign, marketers
More informationDeliverability Counts
Deliverability Counts 10 Factors That Impact Email Deliverability Deliverability Counts 2015 Harland Clarke Digital www.hcdigital.com 1 20% of legitimate commercial email is not being delivered to inboxes.
More informationWhen Reputation is Not Enough: Barracuda Spam Firewall Predictive Sender Profiling. White Paper
When Reputation is Not Enough: Barracuda Spam Firewall Predictive Sender Profiling White Paper As spam continues to evolve, Barracuda Networks remains committed to providing the highest level of protection
More informationAnti-Phishing Best Practices for ISPs and Mailbox Providers
Anti-Phishing Best Practices for ISPs and Mailbox Providers Version 2.01, June 2015 A document jointly produced by the Messaging, Malware and Mobile Anti-Abuse Working Group (M 3 AAWG) and the Anti-Phishing
More informationAn Overview of Spam Blocking Techniques
An Overview of Spam Blocking Techniques Recent analyst estimates indicate that over 60 percent of the world s email is unsolicited email, or spam. Spam is no longer just a simple annoyance. Spam has now
More informationGroundbreaking Technology Redefines Spam Prevention. Analysis of a New High-Accuracy Method for Catching Spam
Groundbreaking Technology Redefines Spam Prevention Analysis of a New High-Accuracy Method for Catching Spam October 2007 Introduction Today, numerous companies offer anti-spam solutions. Most techniques
More informationEmbedded Network Solutions Australia Pty Ltd (ENSA) INTERNET ACCEPTABLE USE POLICY
T: 1300 00 ENSA (3672) F: 03 9421 6109 (ENSA) INTERNET ACCEPTABLE USE POLICY 1 ABOUT THIS POLICY... 2 2 GENERAL... 2 3 ILLEGAL ACTIVITY... 2 4 SECURITY... 2 5 RISKS OF THE INTERNET... 3 6 CONTENT PUBLISHING...
More informationGlobal Reputation Monitoring The FortiGuard Security Intelligence Database WHITE PAPER
Global Reputation Monitoring The FortiGuard Security Intelligence Database WHITE PAPER FORTINET Global Reputation Monitoring PAGE 2 Overview Fortinet s FortiGuard Security Services delivers two essential
More informationGovernment of Canada Managed Security Service (GCMSS) Annex A-5: Statement of Work - Antispam
Government of Canada Managed Security Service (GCMSS) Date: June 8, 2012 TABLE OF CONTENTS 1 ANTISPAM... 1 1.1 QUALITY OF SERVICE...1 1.2 DETECTION AND RESPONSE...1 1.3 MESSAGE HANDLING...2 1.4 CONFIGURATION...2
More informationEmail Delivery Simplified White Paper
Email Delivery Simplified White Paper April 28, 2005 Prepared by StrongMail Systems, Inc. 1300 Island Drive, Suite 200 Redwood Shores, CA 94065 t. (650) 421-4200 f. (650) 421-4201 info@strongmailsystems.com
More informationHow To Ensure Your Email Is Delivered
Everything You Need to Know About Delivering Email through Your Web Application SECTION 1 The Most Important Fact about Email: Delivery is Never Guaranteed Email is the backbone of the social web, making
More informationSPAM. What can be done by governments, to prevent spam? What can be done by IT professional bodies?
SPAM What can be done by governments, to prevent spam? What can be done by IT professional bodies? 2 SPAM - Professional Practice Group Presentation Introduction What is Spam? Spam Origin Spam Categories
More informationREPUTATION-BASED MAIL FLOW CONTROL
WHITE PAPER REPUTATION-BASED MAIL FLOW CONTROL Blocking Extreme Spam and Reducing False Positives Blocking unsolicited commercial email or spam is an increasingly important but difficult task for IT staff.
More informationANTI-SPAM FRAMEWORK OF BEST PRACTICES AND TECHNICAL GUIDELINES
NISER REPORT NISER-SPA-8020-3401 ANTI-SPAM FRAMEWORK OF BEST PRACTICES AND TECHNICAL GUIDELINES Issue 2.00 11 April 2005 National ICT Security and Emergency Response Centre MIMOS Berhad Technology Park
More informationGFI Product Comparison. GFI MailEssentials vs Barracuda Spam Firewall
GFI Product Comparison GFI MailEssentials vs Barracuda Spam Firewall GFI MailEssentials Barracuda Spam Firewall Integrates closely with Microsoft Exchange Server 2003/2007/2010 Integrates closely with
More informationTightening the Net: A Review of Current and Next Generation Spam Filtering Tools
Tightening the Net: A Review of Current and Next Generation Spam Filtering Tools Spam Track Wednesday 1 March, 2006 APRICOT Perth, Australia James Carpinter & Ray Hunt Dept. of Computer Science and Software
More informationAdaptive Filtering of SPAM
Adaptive Filtering of SPAM L. Pelletier, J. Almhana, V. Choulakian GRETI, University of Moncton Moncton, N.B.,Canada E1A 3E9 {elp6880, almhanaj, choulav}@umoncton.ca Abstract In this paper, we present
More informationThe DMA s Analysis of Can Spam Act of 2003
The DMA s Analysis of Can Spam Act of 2003 December 11, 2003 The following is a Direct Marketing Association analysis of the Can Spam Act of 2003 (S. 877), which Congress sent to the President for signing
More informationChina s Anti-Spam Works
China s Anti-Spam Works Jingguang FU Ministry of Information Industry, China Geneva 7-9 July 2004 China s current situation of spam problem China is a serious victim of spam problem. A survey shows that
More informationA Phased Framework for Countering VoIP SPAM
International Journal of Advanced Science and Technology 21 A Phased Framework for Countering VoIP SPAM Jongil Jeong 1, Taijin Lee 1, Seokung Yoon 1, Hyuncheol Jeong 1, Yoojae Won 1, Myuhngjoo Kim 2 1
More informationSavita Teli 1, Santoshkumar Biradar 2
Effective Spam Detection Method for Email Savita Teli 1, Santoshkumar Biradar 2 1 (Student, Dept of Computer Engg, Dr. D. Y. Patil College of Engg, Ambi, University of Pune, M.S, India) 2 (Asst. Proff,
More informationA Survey on Spam Filtering for Online Social Networks
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 4, April 2014,
More informationUsing MDaemon AntiSpam for Spam Control
Using MDaemon AntiSpam for Spam Control Alt-N Technologies, Ltd 2201 East Lamar Blvd, Suite 270 Arlington, TX 76006 Tel: (817) 525-2005 2003 Alt-N Technologies. All rights reserved. SPAM is a trademark
More informationWebinar: Reputation Services The first line of defense. July 26, 2005
Webinar: Reputation Services The first line of defense July 26, 2005 Speakers Richi Jennings - Moderator Richi Jennings Associates Dave Rand Chief Technologist, Internet Content Security Trend Micro John
More informationA Monitor Tool for Anti-spam Mechanisms and Spammers Behavior
A Monitor Tool for Anti-spam Mechanisms and Spammers Behavior Danilo Michalczuk Taveira and Otto Carlos Muniz Bandeira Duarte UFRJ - PEE/COPPE/GTA - DEL/POLI P.O. Box 6854-2945-97, Rio de Janeiro, RJ,
More informationSpam: What Consumers Really Think
From First Click to Lifetime Customer WHITE PAPER Spam: What Consumers Really Think Survey Finds Growing Anger; Advice for Avoiding Recipients Wrath SPAM: WHAT CONSUMERS REALLY THINK Survey finds growing
More informationHow To Filter Email From A Spam Filter
Spam Filtering A WORD TO THE WISE WHITE PAPER BY LAURA ATKINS, CO- FOUNDER 2 Introduction Spam filtering is a catch- all term that describes the steps that happen to an email between a sender and a receiver
More informationTransactional Behaviour Based Spam Detection
Transactional Behaviour Based Spam Detection By Thomas Choi A thesis submitted to The Faculty of Graduate Studies and Research in partial fulfilment of the degree requirements of Master of Applied Science
More informationCommunications and Information Technology Commission. Suggested SPAM Monitoring Framework for CITC
Communications and Information Technology Commission Suggested SPAM Monitoring Framework for CITC 23/02/2008 Submitted to: Submitted By: Suggested SPAM Monitoring Framework Identification of Legal Domains
More informationReview of Proposed Legislative Framework For the Control of E-mail Spam
Review of Proposed Legislative Framework For the Control of E-mail Spam Name: Job title: Company: Steven Sim Kok Leong IT Security Specialist Infocomm Security / QA, Computer Centre, NUS C. - Comment Q.
More informationOIS. Update on the anti spam system at CERN. Pawel Grzywaczewski, CERN IT/OIS HEPIX fall 2010
OIS Update on the anti spam system at CERN Pawel Grzywaczewski, CERN IT/OIS HEPIX fall 2010 OIS Current mail infrastructure Mail service in numbers: ~18 000 mailboxes ~ 18 000 mailing lists (e-groups)
More informationObjective This howto demonstrates and explains the different mechanisms for fending off unwanted spam e-mail.
Collax Spam Filter Howto This howto describes the configuration of the spam filter on a Collax server. Requirements Collax Business Server Collax Groupware Suite Collax Security Gateway Collax Platform
More informationProtect your brand from phishing emails by implementing DMARC 1
Protect your brand from phishing emails by implementing DMARC 1 Message from the Certified Senders Alliance supported by AOL, Microsoft and Google In the following article we want to clarify why marketers
More informationWHITEPAPER. SendGrid Deliverability Guide V2. Everything You Need to Know About Delivering Email through Your Web Application
WHITEPAPER SendGrid Deliverability Guide V2 Everything You Need to Know About Delivering Email through Your Web Application The Most Important Fact about Email: Delivery is Never Guaranteed Email is the
More informationHow to keep spam off your network
GFI White Paper How to keep spam off your network What features to look for in anti-spam technology A buyer s guide to anti-spam software, this white paper highlights the key features to look for in anti-spam
More informationHow To Prevent Spam From Being Filtered Out Of Your Email Program
Active Carrot - Avoiding Spam Filters Table of Contents What is Spam?... 3 How Spam Filters Work... 3 Avoid these common mistakes... 3 Preventing False Abuse Reports... 4 How Abuse Reports Work... 4 Reasons
More informationINBOX. How to make sure more emails reach your subscribers
INBOX How to make sure more emails reach your subscribers White Paper 2011 Contents 1. Email and delivery challenge 2 2. Delivery or deliverability? 3 3. Getting email delivered 3 4. Getting into inboxes
More informationWhen Reputation is Not Enough: Barracuda Spam & Virus Firewall Predictive Sender Profiling
When Reputation is Not Enough: Barracuda Spam & Virus Firewall Predictive Sender Profiling As spam continues to evolve, Barracuda Networks remains committed to providing the highest level of protection
More informationPrevention of Spam over IP Telephony (SPIT)
General Papers Prevention of Spam over IP Telephony (SPIT) Juergen QUITTEK, Saverio NICCOLINI, Sandra TARTARELLI, Roman SCHLEGEL Abstract Spam over IP Telephony (SPIT) is expected to become a serious problem
More informationIpswitch IMail Server with Integrated Technology
Ipswitch IMail Server with Integrated Technology As spammers grow in their cleverness, their means of inundating your life with spam continues to grow very ingeniously. The majority of spam messages these
More informationTHE ANTI-SPAM REGULATORY POLICY FRAMEWORK FOR THE KINGDOM OF SAUDI ARABIA
Communications and Information Technology Commission THE ANTI-SPAM REGULATORY POLICY FRAMEWORK FOR THE KINGDOM OF SAUDI ARABIA Final Version 23/02/2008 Submitted to: Submitted By: Acceptance of Deliverable
More informationKaspersky Anti-Spam 3.0
Kaspersky Anti-Spam 3.0 Whitepaper Collecting spam samples The Linguistic Laboratory Updates to antispam databases Spam filtration servers Spam filtration is more than simply a software program. It is
More informationSpam filtering. Peter Likarish Based on slides by EJ Jung 11/03/10
Spam filtering Peter Likarish Based on slides by EJ Jung 11/03/10 What is spam? An unsolicited email equivalent to Direct Mail in postal service UCE (unsolicited commercial email) UBE (unsolicited bulk
More informationPowerful and reliable virus and spam protection for your GMS installation
Introducing integrated, Enterprise-grade malware protection for GMS on-premise deployments Malware protection from Gordano Messaging Services provides powerful anti-virus and anti-spam for all on-premise
More informationITU WSIS Thematic Meeting on Countering Spam: The Scope of the problem. Mark Sunner, Chief Technical Officer MessageLabs
ITU WSIS Thematic Meeting on Countering Spam: The Scope of the problem Mark Sunner, Chief Technical Officer MessageLabs 6 th July 2004 MessageLabs MessageLabs protects businesses worldwide against email
More informationOCT Training & Technology Solutions Training@qc.cuny.edu (718) 997-4875
OCT Training & Technology Solutions Training@qc.cuny.edu (718) 997-4875 Understanding Information Security Information Security Information security refers to safeguarding information from misuse and theft,
More informationWhat Are the Measures Used by European Providers to Reduce the Amount of Spam Received by Their Customers?
ENISA 2009 spam survey December 09 Measures used by providers to reduce spam What Are the Measures Used by European Providers to Reduce the Amount of Spam Received by Their Customers? Third ENISA Anti-Spam
More informationMalicious Code and Spam in Wired and Wireless Environments: Problems and Solutions
Malicious Code and Spam in Wired and Wireless Environments: Problems and Solutions Joel Sing and Ben Soh Department of Computer Science and Computer Engineering La Trobe University Bundoora VIC 3083, Australia
More informationAntispam Security Best Practices
Antispam Security Best Practices First, the bad news. In the war between spammers and legitimate mail users, spammers are winning, and will continue to do so for the foreseeable future. The cost for spammers
More informationComprehensive Email Filtering: Barracuda Spam Firewall Safeguards Legitimate Email
: Barracuda Firewall Safeguards Legitimate Email Email has undoubtedly become a valued communications tool among organizations worldwide. With frequent virus attacks and the alarming influx of spam, email
More informationGFI Product Comparison. GFI MailEssentials vs Symantec Mail Security for Microsoft Exchange 7.0
GFI Product Comparison GFI MailEssentials vs Symantec Mail Security for Microsoft Exchange 7.0 GFI MailEssentials Symantec Mail Security for Microsoft Exchange 7.0 Supports Microsoft Exchange Server 2003
More informationThe spam economy: the convergent spam and virus threats
The spam economy: the convergent spam and virus threats A Sophos whitepaper May 2005 SUMMARY Spammers, virus writers and hackers were once distinct communities with distinct motivations. However, the success
More informationWhy Spamhaus is Your Best Approach to Fighting Spam
Page 1 of 10 Executive Summary The spam problem is evolving and while overall spam volumes are down, the problems are getting worse. No longer just a nuisance wasting resources and time, spam is now a
More informationDMA s E-Mail Authentication Requirement: FAQs and Best Practices
DMA s E-Mail Authentication Requirement: FAQs and Best Practices DMA s Board of Directors approved a new guideline for ethical marketing practices in October 2005, with the new member requirement going
More informationBlackbaud Communication Services Overview of Email Delivery and FAQs
Blackbaud Communication Services Blackbaud Communication Services Overview of Email Delivery and FAQs Email Delivery through your Blackbaud Solutions Blackbaud Communication Services can send large numbers
More informationAnti Spam Best Practices
39 Anti Spam Best Practices Anti Spam Engine: Time-Tested Scanning An IceWarp White Paper October 2008 www.icewarp.com 40 Background The proliferation of spam will increase. That is a fact. Secure Computing
More information